{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,12,13]],"date-time":"2022-12-13T19:55:06Z","timestamp":1670961306284},"reference-count":15,"publisher":"International Academy Publishing (IAP)","issue":"12","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JSW"],"DOI":"10.4304\/jsw.8.12.3048-3054","type":"journal-article","created":{"date-parts":[[2013,12,20]],"date-time":"2013-12-20T15:58:08Z","timestamp":1387555088000},"source":"Crossref","is-referenced-by-count":1,"title":["Automatic Creation of Artistic Chinese Calligraphy"],"prefix":"10.17706","volume":"8","author":[{"given":"Wei","family":"Li","sequence":"first","affiliation":[]},{"given":"Changle","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"7163","published-online":{"date-parts":[[2013,12,1]]},"reference":[{"key":"ref1","first-page":"127","article-title":"Example-based automatic font generation","volume-title":"Smart Graphics Lecture Notes in Computer Science","volume":"6133","author":"Suveeranont","year":"2010","unstructured":"[1] Rapee Suveeranont and Takeo Igarashi, \"Example-based automatic font generation,\" Smart Graphics Lecture Notes in Computer Science, Springer, vol. 6133, pp. 127-138, 2010."},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2006.11.024"},{"key":"ref3","first-page":"995","article-title":"Jim H Kim, \"Generation of handwritten characters with bayesian network based on line handwriting recognizers","volume-title":"Seventh International Conference on Document Analysis and Recognition","author":"Choi","year":"2003","unstructured":"[4] Hyunil Choi, Sung-Jung Cho, Jim H Kim, \"Generation of handwritten characters with bayesian network based on line handwriting recognizers,\" in Seventh International Conference on Document Analysis and Recognition, pp. 995-999, 2003."},{"issue":"no. 2","key":"ref4","first-page":"44","article-title":"Automatic Generation of Chinese Calligraphic Writings with Style Imitation","volume":"24","author":"Xu","year":"2009","unstructured":"[7] Songhua Xu, Hao Jiang, Tao Jin, Francis C.M. Lau, Yunhe Pan, \"Automatic Generation of Chinese Calligraphic Writings with Style Imitation,\" IEEE Intelligent Systems, Institute of Electrical and El-ectronics Engineers Inc. vol. 24, no. 2, pp. 44-53, 2009.","journal-title":"IEEE Intelligent Systems Institute of Electrical and El-ectronics Engineers Inc"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2008.110"},{"issue":"no. 3","key":"ref6","first-page":"32","article-title":"Automatic generation of artistic Chinese Calligraphy","volume":"20","author":"Xu","year":"2005","unstructured":"[9] Songhua Xu, Francis C.M. Lau, William K. Cheung, Yunhe Pan, \"Automatic generation of artistic Chinese Calligraphy,\" IEEE Intelligent Systems, Institute of Electrical and Electronics Engineers Inc., vol. 20, no. 3, pp. 32-39, 2005.","journal-title":"IEEE Intelligent Systems Institute of Electrical and Electronics Engineers Inc"},{"key":"ref7","first-page":"472","article-title":"Using Skeletonization and Shortest Skeleton Path Approach for Chinese Character Representation","volume":"2008","author":"Low","year":"2008","unstructured":"[11] Jing-Hong Low, Chee-Onn Wong, Kirak Kim, Keechul Jung, Eunjung Han, Hwangkyu Yang, \"Using Skeletonization and Shortest Skeleton Path Approach for Chinese Character Representation, \" Digital Image Computing: Techniques and Applications, DICTA 2008, pp. 472-479, 2008.","journal-title":"Digital Image Computing"},{"key":"ref8","first-page":"281","volume-title":"A Heuristic Search Approach to Chinese Glyph Generation Using Hierarchical Character Composition","author":"Lai","year":"1997","unstructured":"[12] Pak-Keung Lai, Dit-Yan Yeung, Man-Chi Pong, \"A Heuristic Search Approach to Chinese Glyph Generation Using Hierarchical Character Composition,\" Computer Processing of Oriental Languages, pp. 281-297, 1997."},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/34.777374"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2012.46"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/BF00116251"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-7373(87)80053-6"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.4304\/jcp.8.6.1449-1455"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.4304\/jcp.6.6.1270-1277"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.4304\/jcp.8.6.1385-1393"}],"container-title":["Journal of Software"],"original-title":[],"deposited":{"date-parts":[[2015,9,15]],"date-time":"2015-09-15T15:24:24Z","timestamp":1442330664000},"score":1,"resource":{"primary":{"URL":"http:\/\/ojs.academypublisher.com\/index.php\/jsw\/article\/view\/10184"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12,1]]},"references-count":15,"journal-issue":{"issue":"12","published-online":{"date-parts":[[2013,12,1]]}},"URL":"https:\/\/doi.org\/10.4304\/jsw.8.12.3048-3054","relation":{},"ISSN":["1796-217X"],"issn-type":[{"value":"1796-217X","type":"print"}],"subject":[],"published":{"date-parts":[[2013,12,1]]}}}